I am using a public LoadPE method off of Github for my stub. I can crypt Mimikatz and it will bypass Windows Defender both statically and dynamically. When ran against Kaspersky it gets caught after a couple of minutes.
My question is how do I defeat this? I am able to successfully loadpe without getting caught. It just gets caught a couple minutes after mimikatz is running, even if I am not running any commands of mimikatz. Is the AV scanning the process memory and finding strings related to mimikatz? Is this a emulator detection? I do not have any anti debugging or anti sandbox built into this.
I am just not sure if this is a issue on my end, or if this is just the nature of the game and I can't use a well known program like mimikatz.
My question is how do I defeat this? I am able to successfully loadpe without getting caught. It just gets caught a couple minutes after mimikatz is running, even if I am not running any commands of mimikatz. Is the AV scanning the process memory and finding strings related to mimikatz? Is this a emulator detection? I do not have any anti debugging or anti sandbox built into this.
I am just not sure if this is a issue on my end, or if this is just the nature of the game and I can't use a well known program like mimikatz.